CVE-2026-1104: CWE-862 Missing Authorization in ninjateam FastDup – Fastest WordPress Migration & Duplicator
CVE-2026-1104 is a high-severity vulnerability in the FastDup WordPress plugin that allows authenticated users with Contributor-level access or higher to create and download full-site backups without proper authorization checks. This flaw arises from missing capability checks on REST API endpoints, enabling unauthorized backup creation and download of the entire WordPress installation, including sensitive database exports and configuration files. Exploitation requires no user interaction beyond authentication, and the vulnerability affects all plugin versions up to 2. 7. 1. Although no exploits are currently known in the wild, the impact on confidentiality, integrity, and availability is significant. European organizations using this plugin are at risk of data exposure and potential site compromise. Mitigation involves promptly updating the plugin once a patch is available or restricting Contributor-level access and monitoring REST API usage. Countries with high WordPress adoption and significant digital infrastructure, such as Germany, France, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2026-1104 is a critical authorization bypass vulnerability classified under CWE-862 affecting the FastDup – Fastest WordPress Migration & Duplicator plugin. The vulnerability stems from missing capability checks on REST API endpoints, which are intended to restrict backup creation and download operations to authorized users only. However, in all versions up to and including 2.7.1, authenticated users with Contributor-level permissions or higher can exploit this flaw to generate and download full backups of the WordPress site. These backups include the entire WordPress installation, encompassing database exports and configuration files, which contain sensitive information such as database credentials, site configurations, and potentially user data. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only requires privileges equivalent to a Contributor (PR:L), without any user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflected in the CVSS score of 8.8. This vulnerability could lead to full site compromise, data leakage, and potential further exploitation. No patches were linked at the time of publication, and no known exploits have been reported in the wild, but the risk remains significant due to the ease of exploitation and the sensitive nature of the data accessible through the backups.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the confidentiality and integrity of their WordPress-based websites. Unauthorized backup downloads can expose sensitive business data, customer information, and internal configurations, potentially leading to data breaches and compliance violations under GDPR. The availability of full backups to unauthorized users also increases the risk of site defacement, ransomware attacks, or further exploitation by adversaries who gain insight into the site’s architecture and credentials. Organizations relying on WordPress for e-commerce, government services, or critical communications could face operational disruptions and reputational damage. The vulnerability’s exploitation requires only Contributor-level access, which is commonly granted to content creators or external collaborators, increasing the attack surface. Given the widespread use of WordPress in Europe, especially in countries with large digital economies, the potential impact is broad and severe.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level access to trusted users only and auditing existing user roles to minimize unnecessary permissions. Organizations should monitor REST API usage logs for unusual backup creation or download activities. Since no patch was available at the time of reporting, disabling or removing the FastDup plugin temporarily can prevent exploitation. Once a security update is released by ninjateam, prompt application of the patch is critical. Additionally, implementing Web Application Firewalls (WAFs) with rules to detect and block unauthorized REST API calls related to backup operations can provide an additional layer of defense. Regular backups should be maintained separately and securely to avoid reliance on the vulnerable plugin. Security teams should also educate content contributors about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of compromised accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1104: CWE-862 Missing Authorization in ninjateam FastDup – Fastest WordPress Migration & Duplicator
Description
CVE-2026-1104 is a high-severity vulnerability in the FastDup WordPress plugin that allows authenticated users with Contributor-level access or higher to create and download full-site backups without proper authorization checks. This flaw arises from missing capability checks on REST API endpoints, enabling unauthorized backup creation and download of the entire WordPress installation, including sensitive database exports and configuration files. Exploitation requires no user interaction beyond authentication, and the vulnerability affects all plugin versions up to 2. 7. 1. Although no exploits are currently known in the wild, the impact on confidentiality, integrity, and availability is significant. European organizations using this plugin are at risk of data exposure and potential site compromise. Mitigation involves promptly updating the plugin once a patch is available or restricting Contributor-level access and monitoring REST API usage. Countries with high WordPress adoption and significant digital infrastructure, such as Germany, France, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-1104 is a critical authorization bypass vulnerability classified under CWE-862 affecting the FastDup – Fastest WordPress Migration & Duplicator plugin. The vulnerability stems from missing capability checks on REST API endpoints, which are intended to restrict backup creation and download operations to authorized users only. However, in all versions up to and including 2.7.1, authenticated users with Contributor-level permissions or higher can exploit this flaw to generate and download full backups of the WordPress site. These backups include the entire WordPress installation, encompassing database exports and configuration files, which contain sensitive information such as database credentials, site configurations, and potentially user data. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only requires privileges equivalent to a Contributor (PR:L), without any user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflected in the CVSS score of 8.8. This vulnerability could lead to full site compromise, data leakage, and potential further exploitation. No patches were linked at the time of publication, and no known exploits have been reported in the wild, but the risk remains significant due to the ease of exploitation and the sensitive nature of the data accessible through the backups.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the confidentiality and integrity of their WordPress-based websites. Unauthorized backup downloads can expose sensitive business data, customer information, and internal configurations, potentially leading to data breaches and compliance violations under GDPR. The availability of full backups to unauthorized users also increases the risk of site defacement, ransomware attacks, or further exploitation by adversaries who gain insight into the site’s architecture and credentials. Organizations relying on WordPress for e-commerce, government services, or critical communications could face operational disruptions and reputational damage. The vulnerability’s exploitation requires only Contributor-level access, which is commonly granted to content creators or external collaborators, increasing the attack surface. Given the widespread use of WordPress in Europe, especially in countries with large digital economies, the potential impact is broad and severe.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level access to trusted users only and auditing existing user roles to minimize unnecessary permissions. Organizations should monitor REST API usage logs for unusual backup creation or download activities. Since no patch was available at the time of reporting, disabling or removing the FastDup plugin temporarily can prevent exploitation. Once a security update is released by ninjateam, prompt application of the patch is critical. Additionally, implementing Web Application Firewalls (WAFs) with rules to detect and block unauthorized REST API calls related to backup operations can provide an additional layer of defense. Regular backups should be maintained separately and securely to avoid reliance on the vulnerable plugin. Security teams should also educate content contributors about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of compromised accounts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-17T01:44:21.479Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698de86ac9e1ff5ad8e08f98
Added to database: 2/12/2026, 2:49:14 PM
Last enriched: 2/12/2026, 3:03:32 PM
Last updated: 2/12/2026, 4:56:39 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61880: n/a
CriticalCVE-2025-55210: CWE-270: Privilege Context Switching Error in FreePBX api
LowCVE-2025-69752: n/a
HighCVE-2025-56647: n/a
MediumCVE-2026-26217: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in unclecode Crawl4AI
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.